2010-04-29 16:14:44 +04:00
|
|
|
/*
|
|
|
|
* Virtio 9p Posix callback
|
|
|
|
*
|
|
|
|
* Copyright IBM, Corp. 2010
|
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Anthony Liguori <aliguori@us.ibm.com>
|
|
|
|
*
|
|
|
|
* This work is licensed under the terms of the GNU GPL, version 2. See
|
|
|
|
* the COPYING file in the top-level directory.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
#include "virtio.h"
|
|
|
|
#include "virtio-9p.h"
|
2010-10-18 13:58:16 +04:00
|
|
|
#include "virtio-9p-xattr.h"
|
2010-04-29 16:14:59 +04:00
|
|
|
#include <arpa/inet.h>
|
2010-04-29 16:14:47 +04:00
|
|
|
#include <pwd.h>
|
|
|
|
#include <grp.h>
|
2010-04-29 16:14:59 +04:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/un.h>
|
2010-06-15 00:34:41 +04:00
|
|
|
#include <attr/xattr.h>
|
2010-04-29 16:14:47 +04:00
|
|
|
|
2010-06-15 00:34:44 +04:00
|
|
|
|
|
|
|
static int local_lstat(FsContext *fs_ctx, const char *path, struct stat *stbuf)
|
2010-04-29 16:14:47 +04:00
|
|
|
{
|
2010-06-15 00:34:44 +04:00
|
|
|
int err;
|
|
|
|
err = lstat(rpath(fs_ctx, path), stbuf);
|
|
|
|
if (err) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
if (fs_ctx->fs_sm == SM_MAPPED) {
|
|
|
|
/* Actual credentials are part of extended attrs */
|
|
|
|
uid_t tmp_uid;
|
|
|
|
gid_t tmp_gid;
|
|
|
|
mode_t tmp_mode;
|
|
|
|
dev_t tmp_dev;
|
|
|
|
if (getxattr(rpath(fs_ctx, path), "user.virtfs.uid", &tmp_uid,
|
|
|
|
sizeof(uid_t)) > 0) {
|
|
|
|
stbuf->st_uid = tmp_uid;
|
|
|
|
}
|
|
|
|
if (getxattr(rpath(fs_ctx, path), "user.virtfs.gid", &tmp_gid,
|
|
|
|
sizeof(gid_t)) > 0) {
|
|
|
|
stbuf->st_gid = tmp_gid;
|
|
|
|
}
|
|
|
|
if (getxattr(rpath(fs_ctx, path), "user.virtfs.mode", &tmp_mode,
|
|
|
|
sizeof(mode_t)) > 0) {
|
|
|
|
stbuf->st_mode = tmp_mode;
|
|
|
|
}
|
|
|
|
if (getxattr(rpath(fs_ctx, path), "user.virtfs.rdev", &tmp_dev,
|
|
|
|
sizeof(dev_t)) > 0) {
|
|
|
|
stbuf->st_rdev = tmp_dev;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err;
|
2010-04-29 16:14:47 +04:00
|
|
|
}
|
|
|
|
|
2010-06-15 00:34:41 +04:00
|
|
|
static int local_set_xattr(const char *path, FsCred *credp)
|
2010-04-29 16:14:47 +04:00
|
|
|
{
|
2010-06-15 00:34:41 +04:00
|
|
|
int err;
|
|
|
|
if (credp->fc_uid != -1) {
|
|
|
|
err = setxattr(path, "user.virtfs.uid", &credp->fc_uid, sizeof(uid_t),
|
|
|
|
0);
|
|
|
|
if (err) {
|
|
|
|
return err;
|
|
|
|
}
|
2010-04-29 16:14:47 +04:00
|
|
|
}
|
2010-06-15 00:34:41 +04:00
|
|
|
if (credp->fc_gid != -1) {
|
|
|
|
err = setxattr(path, "user.virtfs.gid", &credp->fc_gid, sizeof(gid_t),
|
|
|
|
0);
|
|
|
|
if (err) {
|
|
|
|
return err;
|
|
|
|
}
|
2010-04-29 16:14:47 +04:00
|
|
|
}
|
2010-06-15 00:34:41 +04:00
|
|
|
if (credp->fc_mode != -1) {
|
|
|
|
err = setxattr(path, "user.virtfs.mode", &credp->fc_mode,
|
|
|
|
sizeof(mode_t), 0);
|
|
|
|
if (err) {
|
|
|
|
return err;
|
|
|
|
}
|
2010-04-29 16:14:47 +04:00
|
|
|
}
|
2010-06-15 00:34:41 +04:00
|
|
|
if (credp->fc_rdev != -1) {
|
|
|
|
err = setxattr(path, "user.virtfs.rdev", &credp->fc_rdev,
|
|
|
|
sizeof(dev_t), 0);
|
|
|
|
if (err) {
|
|
|
|
return err;
|
|
|
|
}
|
2010-04-29 16:14:47 +04:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-06-15 00:34:45 +04:00
|
|
|
static int local_post_create_passthrough(FsContext *fs_ctx, const char *path,
|
|
|
|
FsCred *credp)
|
|
|
|
{
|
|
|
|
if (chmod(rpath(fs_ctx, path), credp->fc_mode & 07777) < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
2010-09-02 09:39:07 +04:00
|
|
|
if (lchown(rpath(fs_ctx, path), credp->fc_uid, credp->fc_gid) < 0) {
|
2010-09-02 09:39:07 +04:00
|
|
|
/*
|
|
|
|
* If we fail to change ownership and if we are
|
|
|
|
* using security model none. Ignore the error
|
|
|
|
*/
|
|
|
|
if (fs_ctx->fs_sm != SM_NONE) {
|
|
|
|
return -1;
|
|
|
|
}
|
2010-06-15 00:34:45 +04:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-06-15 00:34:47 +04:00
|
|
|
static ssize_t local_readlink(FsContext *fs_ctx, const char *path,
|
|
|
|
char *buf, size_t bufsz)
|
2010-04-29 16:14:47 +04:00
|
|
|
{
|
2010-06-15 00:34:47 +04:00
|
|
|
ssize_t tsize = -1;
|
|
|
|
if (fs_ctx->fs_sm == SM_MAPPED) {
|
|
|
|
int fd;
|
|
|
|
fd = open(rpath(fs_ctx, path), O_RDONLY);
|
|
|
|
if (fd == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
do {
|
|
|
|
tsize = read(fd, (void *)buf, bufsz);
|
|
|
|
} while (tsize == -1 && errno == EINTR);
|
|
|
|
close(fd);
|
|
|
|
return tsize;
|
2010-09-02 09:39:07 +04:00
|
|
|
} else if ((fs_ctx->fs_sm == SM_PASSTHROUGH) ||
|
|
|
|
(fs_ctx->fs_sm == SM_NONE)) {
|
2010-06-15 00:34:47 +04:00
|
|
|
tsize = readlink(rpath(fs_ctx, path), buf, bufsz);
|
|
|
|
}
|
|
|
|
return tsize;
|
2010-04-29 16:14:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static int local_close(FsContext *ctx, int fd)
|
|
|
|
{
|
|
|
|
return close(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int local_closedir(FsContext *ctx, DIR *dir)
|
|
|
|
{
|
|
|
|
return closedir(dir);
|
|
|
|
}
|
2010-04-29 16:14:44 +04:00
|
|
|
|
2010-04-29 16:14:55 +04:00
|
|
|
static int local_open(FsContext *ctx, const char *path, int flags)
|
|
|
|
{
|
|
|
|
return open(rpath(ctx, path), flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
static DIR *local_opendir(FsContext *ctx, const char *path)
|
|
|
|
{
|
|
|
|
return opendir(rpath(ctx, path));
|
|
|
|
}
|
|
|
|
|
2010-04-29 16:14:56 +04:00
|
|
|
static void local_rewinddir(FsContext *ctx, DIR *dir)
|
|
|
|
{
|
|
|
|
return rewinddir(dir);
|
|
|
|
}
|
|
|
|
|
|
|
|
static off_t local_telldir(FsContext *ctx, DIR *dir)
|
|
|
|
{
|
|
|
|
return telldir(dir);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct dirent *local_readdir(FsContext *ctx, DIR *dir)
|
|
|
|
{
|
|
|
|
return readdir(dir);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void local_seekdir(FsContext *ctx, DIR *dir, off_t off)
|
|
|
|
{
|
|
|
|
return seekdir(dir, off);
|
|
|
|
}
|
|
|
|
|
2010-10-08 10:00:16 +04:00
|
|
|
static ssize_t local_preadv(FsContext *ctx, int fd, const struct iovec *iov,
|
|
|
|
int iovcnt, off_t offset)
|
2010-04-29 16:14:56 +04:00
|
|
|
{
|
2010-10-08 10:00:16 +04:00
|
|
|
#ifdef CONFIG_PREADV
|
|
|
|
return preadv(fd, iov, iovcnt, offset);
|
|
|
|
#else
|
|
|
|
int err = lseek(fd, offset, SEEK_SET);
|
|
|
|
if (err == -1) {
|
|
|
|
return err;
|
|
|
|
} else {
|
|
|
|
return readv(fd, iov, iovcnt);
|
|
|
|
}
|
|
|
|
#endif
|
2010-04-29 16:14:56 +04:00
|
|
|
}
|
|
|
|
|
2010-10-08 10:00:16 +04:00
|
|
|
static ssize_t local_pwritev(FsContext *ctx, int fd, const struct iovec *iov,
|
|
|
|
int iovcnt, off_t offset)
|
2010-04-29 16:14:58 +04:00
|
|
|
{
|
2010-10-08 10:00:16 +04:00
|
|
|
#ifdef CONFIG_PREADV
|
|
|
|
return pwritev(fd, iov, iovcnt, offset);
|
|
|
|
#else
|
|
|
|
int err = lseek(fd, offset, SEEK_SET);
|
|
|
|
if (err == -1) {
|
|
|
|
return err;
|
|
|
|
} else {
|
|
|
|
return writev(fd, iov, iovcnt);
|
|
|
|
}
|
|
|
|
#endif
|
2010-04-29 16:14:58 +04:00
|
|
|
}
|
|
|
|
|
2010-06-15 00:34:42 +04:00
|
|
|
static int local_chmod(FsContext *fs_ctx, const char *path, FsCred *credp)
|
2010-04-29 16:14:59 +04:00
|
|
|
{
|
2010-06-15 00:34:42 +04:00
|
|
|
if (fs_ctx->fs_sm == SM_MAPPED) {
|
|
|
|
return local_set_xattr(rpath(fs_ctx, path), credp);
|
2010-09-02 09:39:07 +04:00
|
|
|
} else if ((fs_ctx->fs_sm == SM_PASSTHROUGH) ||
|
|
|
|
(fs_ctx->fs_sm == SM_NONE)) {
|
2010-06-15 00:34:42 +04:00
|
|
|
return chmod(rpath(fs_ctx, path), credp->fc_mode);
|
|
|
|
}
|
|
|
|
return -1;
|
2010-04-29 16:14:59 +04:00
|
|
|
}
|
|
|
|
|
2010-06-15 00:34:48 +04:00
|
|
|
static int local_mknod(FsContext *fs_ctx, const char *path, FsCred *credp)
|
2010-04-29 16:14:59 +04:00
|
|
|
{
|
2010-06-15 00:34:48 +04:00
|
|
|
int err = -1;
|
|
|
|
int serrno = 0;
|
|
|
|
|
|
|
|
/* Determine the security model */
|
|
|
|
if (fs_ctx->fs_sm == SM_MAPPED) {
|
|
|
|
err = mknod(rpath(fs_ctx, path), SM_LOCAL_MODE_BITS|S_IFREG, 0);
|
|
|
|
if (err == -1) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
local_set_xattr(rpath(fs_ctx, path), credp);
|
|
|
|
if (err == -1) {
|
|
|
|
serrno = errno;
|
|
|
|
goto err_end;
|
|
|
|
}
|
2010-09-02 09:39:07 +04:00
|
|
|
} else if ((fs_ctx->fs_sm == SM_PASSTHROUGH) ||
|
|
|
|
(fs_ctx->fs_sm == SM_NONE)) {
|
2010-06-15 00:34:48 +04:00
|
|
|
err = mknod(rpath(fs_ctx, path), credp->fc_mode, credp->fc_rdev);
|
|
|
|
if (err == -1) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
err = local_post_create_passthrough(fs_ctx, path, credp);
|
|
|
|
if (err == -1) {
|
|
|
|
serrno = errno;
|
|
|
|
goto err_end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err;
|
|
|
|
|
|
|
|
err_end:
|
|
|
|
remove(rpath(fs_ctx, path));
|
|
|
|
errno = serrno;
|
|
|
|
return err;
|
2010-04-29 16:14:59 +04:00
|
|
|
}
|
|
|
|
|
2010-06-15 00:34:46 +04:00
|
|
|
static int local_mkdir(FsContext *fs_ctx, const char *path, FsCred *credp)
|
2010-04-29 16:14:59 +04:00
|
|
|
{
|
2010-06-15 00:34:46 +04:00
|
|
|
int err = -1;
|
|
|
|
int serrno = 0;
|
|
|
|
|
|
|
|
/* Determine the security model */
|
|
|
|
if (fs_ctx->fs_sm == SM_MAPPED) {
|
|
|
|
err = mkdir(rpath(fs_ctx, path), SM_LOCAL_DIR_MODE_BITS);
|
|
|
|
if (err == -1) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
credp->fc_mode = credp->fc_mode|S_IFDIR;
|
|
|
|
err = local_set_xattr(rpath(fs_ctx, path), credp);
|
|
|
|
if (err == -1) {
|
|
|
|
serrno = errno;
|
|
|
|
goto err_end;
|
|
|
|
}
|
2010-09-02 09:39:07 +04:00
|
|
|
} else if ((fs_ctx->fs_sm == SM_PASSTHROUGH) ||
|
|
|
|
(fs_ctx->fs_sm == SM_NONE)) {
|
2010-06-15 00:34:46 +04:00
|
|
|
err = mkdir(rpath(fs_ctx, path), credp->fc_mode);
|
|
|
|
if (err == -1) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
err = local_post_create_passthrough(fs_ctx, path, credp);
|
|
|
|
if (err == -1) {
|
|
|
|
serrno = errno;
|
|
|
|
goto err_end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err;
|
|
|
|
|
|
|
|
err_end:
|
|
|
|
remove(rpath(fs_ctx, path));
|
|
|
|
errno = serrno;
|
|
|
|
return err;
|
2010-04-29 16:14:59 +04:00
|
|
|
}
|
|
|
|
|
2010-06-15 00:34:44 +04:00
|
|
|
static int local_fstat(FsContext *fs_ctx, int fd, struct stat *stbuf)
|
2010-04-29 16:14:59 +04:00
|
|
|
{
|
2010-06-15 00:34:44 +04:00
|
|
|
int err;
|
|
|
|
err = fstat(fd, stbuf);
|
|
|
|
if (err) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
if (fs_ctx->fs_sm == SM_MAPPED) {
|
|
|
|
/* Actual credentials are part of extended attrs */
|
|
|
|
uid_t tmp_uid;
|
|
|
|
gid_t tmp_gid;
|
|
|
|
mode_t tmp_mode;
|
|
|
|
dev_t tmp_dev;
|
|
|
|
|
|
|
|
if (fgetxattr(fd, "user.virtfs.uid", &tmp_uid, sizeof(uid_t)) > 0) {
|
|
|
|
stbuf->st_uid = tmp_uid;
|
|
|
|
}
|
|
|
|
if (fgetxattr(fd, "user.virtfs.gid", &tmp_gid, sizeof(gid_t)) > 0) {
|
|
|
|
stbuf->st_gid = tmp_gid;
|
|
|
|
}
|
|
|
|
if (fgetxattr(fd, "user.virtfs.mode", &tmp_mode, sizeof(mode_t)) > 0) {
|
|
|
|
stbuf->st_mode = tmp_mode;
|
|
|
|
}
|
|
|
|
if (fgetxattr(fd, "user.virtfs.rdev", &tmp_dev, sizeof(dev_t)) > 0) {
|
|
|
|
stbuf->st_rdev = tmp_dev;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return err;
|
2010-04-29 16:14:59 +04:00
|
|
|
}
|
|
|
|
|
2010-06-15 00:34:45 +04:00
|
|
|
static int local_open2(FsContext *fs_ctx, const char *path, int flags,
|
|
|
|
FsCred *credp)
|
2010-04-29 16:14:59 +04:00
|
|
|
{
|
2010-06-15 00:34:45 +04:00
|
|
|
int fd = -1;
|
|
|
|
int err = -1;
|
|
|
|
int serrno = 0;
|
|
|
|
|
|
|
|
/* Determine the security model */
|
|
|
|
if (fs_ctx->fs_sm == SM_MAPPED) {
|
|
|
|
fd = open(rpath(fs_ctx, path), flags, SM_LOCAL_MODE_BITS);
|
|
|
|
if (fd == -1) {
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
credp->fc_mode = credp->fc_mode|S_IFREG;
|
|
|
|
/* Set cleint credentials in xattr */
|
|
|
|
err = local_set_xattr(rpath(fs_ctx, path), credp);
|
|
|
|
if (err == -1) {
|
|
|
|
serrno = errno;
|
|
|
|
goto err_end;
|
|
|
|
}
|
2010-09-02 09:39:07 +04:00
|
|
|
} else if ((fs_ctx->fs_sm == SM_PASSTHROUGH) ||
|
|
|
|
(fs_ctx->fs_sm == SM_NONE)) {
|
2010-06-15 00:34:45 +04:00
|
|
|
fd = open(rpath(fs_ctx, path), flags, credp->fc_mode);
|
|
|
|
if (fd == -1) {
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
err = local_post_create_passthrough(fs_ctx, path, credp);
|
|
|
|
if (err == -1) {
|
|
|
|
serrno = errno;
|
|
|
|
goto err_end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
|
|
|
|
err_end:
|
|
|
|
close(fd);
|
|
|
|
remove(rpath(fs_ctx, path));
|
|
|
|
errno = serrno;
|
|
|
|
return err;
|
2010-04-29 16:14:59 +04:00
|
|
|
}
|
|
|
|
|
2010-06-15 00:34:41 +04:00
|
|
|
|
2010-06-15 00:34:47 +04:00
|
|
|
static int local_symlink(FsContext *fs_ctx, const char *oldpath,
|
|
|
|
const char *newpath, FsCred *credp)
|
2010-04-29 16:14:59 +04:00
|
|
|
{
|
2010-06-15 00:34:47 +04:00
|
|
|
int err = -1;
|
|
|
|
int serrno = 0;
|
|
|
|
|
|
|
|
/* Determine the security model */
|
|
|
|
if (fs_ctx->fs_sm == SM_MAPPED) {
|
|
|
|
int fd;
|
|
|
|
ssize_t oldpath_size, write_size;
|
|
|
|
fd = open(rpath(fs_ctx, newpath), O_CREAT|O_EXCL|O_RDWR,
|
|
|
|
SM_LOCAL_MODE_BITS);
|
|
|
|
if (fd == -1) {
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
/* Write the oldpath (target) to the file. */
|
|
|
|
oldpath_size = strlen(oldpath) + 1;
|
|
|
|
do {
|
|
|
|
write_size = write(fd, (void *)oldpath, oldpath_size);
|
|
|
|
} while (write_size == -1 && errno == EINTR);
|
|
|
|
|
|
|
|
if (write_size != oldpath_size) {
|
|
|
|
serrno = errno;
|
|
|
|
close(fd);
|
|
|
|
err = -1;
|
|
|
|
goto err_end;
|
|
|
|
}
|
|
|
|
close(fd);
|
|
|
|
/* Set cleint credentials in symlink's xattr */
|
|
|
|
credp->fc_mode = credp->fc_mode|S_IFLNK;
|
|
|
|
err = local_set_xattr(rpath(fs_ctx, newpath), credp);
|
|
|
|
if (err == -1) {
|
|
|
|
serrno = errno;
|
|
|
|
goto err_end;
|
|
|
|
}
|
2010-09-02 09:39:07 +04:00
|
|
|
} else if ((fs_ctx->fs_sm == SM_PASSTHROUGH) ||
|
|
|
|
(fs_ctx->fs_sm == SM_NONE)) {
|
2010-06-15 00:34:47 +04:00
|
|
|
err = symlink(oldpath, rpath(fs_ctx, newpath));
|
|
|
|
if (err) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
err = lchown(rpath(fs_ctx, newpath), credp->fc_uid, credp->fc_gid);
|
|
|
|
if (err == -1) {
|
2010-09-02 09:39:07 +04:00
|
|
|
/*
|
|
|
|
* If we fail to change ownership and if we are
|
|
|
|
* using security model none. Ignore the error
|
|
|
|
*/
|
|
|
|
if (fs_ctx->fs_sm != SM_NONE) {
|
|
|
|
serrno = errno;
|
|
|
|
goto err_end;
|
|
|
|
} else
|
|
|
|
err = 0;
|
2010-06-15 00:34:47 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return err;
|
|
|
|
|
|
|
|
err_end:
|
|
|
|
remove(rpath(fs_ctx, newpath));
|
|
|
|
errno = serrno;
|
|
|
|
return err;
|
2010-04-29 16:14:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static int local_link(FsContext *ctx, const char *oldpath, const char *newpath)
|
|
|
|
{
|
|
|
|
char *tmp = qemu_strdup(rpath(ctx, oldpath));
|
|
|
|
int err, serrno = 0;
|
|
|
|
|
|
|
|
if (tmp == NULL) {
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = link(tmp, rpath(ctx, newpath));
|
|
|
|
if (err == -1) {
|
|
|
|
serrno = errno;
|
|
|
|
}
|
|
|
|
|
|
|
|
qemu_free(tmp);
|
|
|
|
|
|
|
|
if (err == -1) {
|
|
|
|
errno = serrno;
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2010-04-29 16:15:00 +04:00
|
|
|
static int local_truncate(FsContext *ctx, const char *path, off_t size)
|
|
|
|
{
|
|
|
|
return truncate(rpath(ctx, path), size);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int local_rename(FsContext *ctx, const char *oldpath,
|
|
|
|
const char *newpath)
|
|
|
|
{
|
|
|
|
char *tmp;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
tmp = qemu_strdup(rpath(ctx, oldpath));
|
|
|
|
|
|
|
|
err = rename(tmp, rpath(ctx, newpath));
|
|
|
|
if (err == -1) {
|
|
|
|
int serrno = errno;
|
|
|
|
qemu_free(tmp);
|
|
|
|
errno = serrno;
|
|
|
|
} else {
|
|
|
|
qemu_free(tmp);
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2010-06-15 00:34:43 +04:00
|
|
|
static int local_chown(FsContext *fs_ctx, const char *path, FsCred *credp)
|
2010-04-29 16:15:00 +04:00
|
|
|
{
|
virtio-9p: Implement server side of setattr for 9P2000.L protocol.
SYNOPSIS
size[4] Tsetattr tag[2] attr[n]
size[4] Rsetattr tag[2]
DESCRIPTION
The setattr command changes some of the file status information.
attr resembles the iattr structure used in Linux kernel. It
specifies which status parameter is to be changed and to what
value. It is laid out as follows:
valid[4]
specifies which status information is to be changed. Possible
values are:
ATTR_MODE (1 << 0)
ATTR_UID (1 << 1)
ATTR_GID (1 << 2)
ATTR_SIZE (1 << 3)
ATTR_ATIME (1 << 4)
ATTR_MTIME (1 << 5)
ATTR_CTIME (1 << 5)
ATTR_ATIME_SET (1 << 7)
ATTR_MTIME_SET (1 << 8)
The last two bits represent whether the time information
is being sent by the client's user space. In the absense
of these bits the server always uses server's time.
mode[4]
File permission bits
uid[4]
Owner id of file
gid[4]
Group id of the file
size[8]
File size
atime_sec[8]
Time of last file access, seconds
atime_nsec[8]
Time of last file access, nanoseconds
mtime_sec[8]
Time of last file modification, seconds
mtime_nsec[8]
Time of last file modification, nanoseconds
Explanation of the patches:
--------------------------
*) The kernel just copies relevent contents of iattr structure to p9_iattr_dotl
structure and passes it down to the client. The only check it has is calling
inode_change_ok()
*) The p9_iattr_dotl structure does not have ctime and ia_file parameters because
I don't think these are needed in our case. The client user space can request
updating just ctime by calling chown(fd, -1, -1). This is handled on server
side without a need for putting ctime on the wire.
*) The server currently supports changing mode, time, ownership and size of the
file.
*) 9P RFC says "Either all the changes in wstat request happen, or none of them
does: if the request succeeds, all changes were made; if it fails, none were."
I have not done anything to implement this specifically because I don't see
a reason.
[jvrao@linux.vnet.ibm.com: Parts of code for handling chown(-1,-1)
Signed-off-by: Sripathi Kodi <sripathik@in.ibm.com>
Signed-off-by: Venkateswararao Jujjuri <jvrao@linux.vnet.ibm.com>
2010-06-17 16:48:47 +04:00
|
|
|
if ((credp->fc_uid == -1 && credp->fc_gid == -1) ||
|
|
|
|
(fs_ctx->fs_sm == SM_PASSTHROUGH)) {
|
|
|
|
return lchown(rpath(fs_ctx, path), credp->fc_uid, credp->fc_gid);
|
|
|
|
} else if (fs_ctx->fs_sm == SM_MAPPED) {
|
2010-06-15 00:34:43 +04:00
|
|
|
return local_set_xattr(rpath(fs_ctx, path), credp);
|
2010-09-02 09:39:07 +04:00
|
|
|
} else if ((fs_ctx->fs_sm == SM_PASSTHROUGH) ||
|
|
|
|
(fs_ctx->fs_sm == SM_NONE)) {
|
2010-06-15 00:34:43 +04:00
|
|
|
return lchown(rpath(fs_ctx, path), credp->fc_uid, credp->fc_gid);
|
|
|
|
}
|
|
|
|
return -1;
|
2010-04-29 16:15:00 +04:00
|
|
|
}
|
|
|
|
|
2010-06-09 17:44:38 +04:00
|
|
|
static int local_utimensat(FsContext *s, const char *path,
|
|
|
|
const struct timespec *buf)
|
2010-04-29 16:15:00 +04:00
|
|
|
{
|
2010-06-09 17:44:38 +04:00
|
|
|
return utimensat(AT_FDCWD, rpath(s, path), buf, AT_SYMLINK_NOFOLLOW);
|
2010-04-29 16:15:00 +04:00
|
|
|
}
|
|
|
|
|
2010-04-29 16:15:01 +04:00
|
|
|
static int local_remove(FsContext *ctx, const char *path)
|
|
|
|
{
|
|
|
|
return remove(rpath(ctx, path));
|
|
|
|
}
|
|
|
|
|
2010-04-29 16:15:00 +04:00
|
|
|
static int local_fsync(FsContext *ctx, int fd)
|
|
|
|
{
|
|
|
|
return fsync(fd);
|
|
|
|
}
|
|
|
|
|
2010-05-10 10:41:03 +04:00
|
|
|
static int local_statfs(FsContext *s, const char *path, struct statfs *stbuf)
|
|
|
|
{
|
|
|
|
return statfs(rpath(s, path), stbuf);
|
|
|
|
}
|
|
|
|
|
2010-09-02 09:39:06 +04:00
|
|
|
static ssize_t local_lgetxattr(FsContext *ctx, const char *path,
|
|
|
|
const char *name, void *value, size_t size)
|
|
|
|
{
|
2010-10-18 13:58:16 +04:00
|
|
|
return v9fs_get_xattr(ctx, path, name, value, size);
|
2010-09-02 09:39:06 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t local_llistxattr(FsContext *ctx, const char *path,
|
|
|
|
void *value, size_t size)
|
|
|
|
{
|
2010-10-18 13:58:16 +04:00
|
|
|
return v9fs_list_xattr(ctx, path, value, size);
|
2010-09-02 09:39:06 +04:00
|
|
|
}
|
|
|
|
|
2010-09-02 09:39:07 +04:00
|
|
|
static int local_lsetxattr(FsContext *ctx, const char *path, const char *name,
|
|
|
|
void *value, size_t size, int flags)
|
|
|
|
{
|
2010-10-18 13:58:16 +04:00
|
|
|
return v9fs_set_xattr(ctx, path, name, value, size, flags);
|
2010-09-02 09:39:07 +04:00
|
|
|
}
|
|
|
|
|
2010-08-26 09:45:23 +04:00
|
|
|
static int local_lremovexattr(FsContext *ctx,
|
|
|
|
const char *path, const char *name)
|
|
|
|
{
|
2010-10-18 13:58:16 +04:00
|
|
|
return v9fs_remove_xattr(ctx, path, name);
|
2010-08-26 09:45:23 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-04-29 16:14:44 +04:00
|
|
|
FileOperations local_ops = {
|
2010-04-29 16:14:47 +04:00
|
|
|
.lstat = local_lstat,
|
|
|
|
.readlink = local_readlink,
|
|
|
|
.close = local_close,
|
|
|
|
.closedir = local_closedir,
|
2010-04-29 16:14:55 +04:00
|
|
|
.open = local_open,
|
|
|
|
.opendir = local_opendir,
|
2010-04-29 16:14:56 +04:00
|
|
|
.rewinddir = local_rewinddir,
|
|
|
|
.telldir = local_telldir,
|
|
|
|
.readdir = local_readdir,
|
|
|
|
.seekdir = local_seekdir,
|
2010-10-08 10:00:16 +04:00
|
|
|
.preadv = local_preadv,
|
|
|
|
.pwritev = local_pwritev,
|
2010-04-29 16:14:59 +04:00
|
|
|
.chmod = local_chmod,
|
|
|
|
.mknod = local_mknod,
|
|
|
|
.mkdir = local_mkdir,
|
|
|
|
.fstat = local_fstat,
|
|
|
|
.open2 = local_open2,
|
|
|
|
.symlink = local_symlink,
|
|
|
|
.link = local_link,
|
2010-04-29 16:15:00 +04:00
|
|
|
.truncate = local_truncate,
|
|
|
|
.rename = local_rename,
|
|
|
|
.chown = local_chown,
|
2010-06-09 17:44:38 +04:00
|
|
|
.utimensat = local_utimensat,
|
2010-04-29 16:15:01 +04:00
|
|
|
.remove = local_remove,
|
2010-04-29 16:15:00 +04:00
|
|
|
.fsync = local_fsync,
|
2010-05-10 10:41:03 +04:00
|
|
|
.statfs = local_statfs,
|
2010-09-02 09:39:06 +04:00
|
|
|
.lgetxattr = local_lgetxattr,
|
|
|
|
.llistxattr = local_llistxattr,
|
2010-09-02 09:39:07 +04:00
|
|
|
.lsetxattr = local_lsetxattr,
|
2010-08-26 09:45:23 +04:00
|
|
|
.lremovexattr = local_lremovexattr,
|
2010-04-29 16:14:44 +04:00
|
|
|
};
|